Movatterモバイル変換


[0]ホーム

URL:


US8281405B1 - System, method, and computer program product for securing data on a server based on a heuristic analysis - Google Patents

System, method, and computer program product for securing data on a server based on a heuristic analysis
Download PDF

Info

Publication number
US8281405B1
US8281405B1US11/762,545US76254507AUS8281405B1US 8281405 B1US8281405 B1US 8281405B1US 76254507 AUS76254507 AUS 76254507AUS 8281405 B1US8281405 B1US 8281405B1
Authority
US
United States
Prior art keywords
data
access
attempts
server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/762,545
Inventor
Satish Kumar Gaddala
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JPMorgan Chase Bank NA
Original Assignee
McAfee LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by McAfee LLCfiledCriticalMcAfee LLC
Priority to US11/762,545priorityCriticalpatent/US8281405B1/en
Assigned to MCAFEE, INC.reassignmentMCAFEE, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GADDALA, SATISH KUMAR
Priority to US13/631,843prioritypatent/US8776252B2/en
Application grantedgrantedCritical
Publication of US8281405B1publicationCriticalpatent/US8281405B1/en
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCCHANGE OF NAME AND ENTITY CONVERSIONAssignors: MCAFEE, INC.
Assigned to JPMORGAN CHASE BANK, N.A.reassignmentJPMORGAN CHASE BANK, N.A.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to JPMORGAN CHASE BANK, N.A.reassignmentJPMORGAN CHASE BANK, N.A.CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST.Assignors: MCAFEE, LLC
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST.Assignors: MCAFEE, LLC
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCRELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786Assignors: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT
Assigned to MCAFEE, LLCreassignmentMCAFEE, LLCRELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676Assignors: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENTreassignmentJPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MCAFEE, LLC
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTreassignmentJPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTCORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: MCAFEE, LLC
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.

Description

FIELD OF THE INVENTION
The present invention relates to securing data, and more particularly to securing data on a server.
BACKGROUND
Traditionally, security systems have been provided for securing data. Oftentimes, such data security is provided for preventing, leakage of data (e.g. unwanted disclosure, sharing, etc. of data) outside of an organization. Recently, data leakage from within an organization has also been of concern.
For example, system administrators are generally granted full access to data within an associated administrated network, many times including confidential data directed toward specific users, like their mail data. As another example, access to a network user's data is sometimes secured using a unique user identifier that is particular to the user, such that unauthorized compromise of such identifier may result in full access to the user's potentially private and/or confidential data. There is thus a need for addressing these and/or other issues associated with the prior art.
SUMMARY
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a network architecture, in accordance with one embodiment.
FIG. 2 shows a representative hardware environment that may be associated with the servers and/or clients ofFIG. 1, in accordance with one embodiment.
FIG. 3 shows a method for securing data on a server based on a heuristic analysis, in accordance with one embodiment.
FIG. 4 shows a method for taking action is response to a determination that information associated with an attempt to access data on a server is suspicious, in accordance with another embodiment.
DETAILED DESCRIPTION
FIG. 1 illustrates anetwork architecture100, in accordance with one embodiment. As shown, a plurality ofnetworks102 is provided. In the context of thepresent network architecture100, thenetworks102 may each take any form including, but not limited to a local area network (LAN), a wireless network, a wide area network (WAN) such as the Internet, peer-to-peer network, etc.
Coupled to thenetworks102 areservers104 which are capable of communicating over thenetworks102. Also coupled to thenetworks102 and theservers104 is a plurality ofclients106.Such servers104 and/orclients106 may each include a desktop computer, lap-top computer, hand-held computer, mobile phone, personal digital assistant (PDA), peripheral (e.g. printer, etc.), any component of a computer, and/or any other type of logic. In order to facilitate communication among thenetworks102, at least onegateway108 is optionally coupled therebetween.
FIG. 2 shows a representative hardware environment that may be associated with theservers104 and/orclients106 ofFIG. 1, in accordance with one embodiment. Such figure illustrates a typical hardware configuration of a workstation in accordance with one embodiment having acentral processing unit210, such as a microprocessor, and a number of other units interconnected via asystem bus212.
The workstation shown inFIG. 2 includes a Random Access Memory (RAM)214, Read Only Memory (ROM)216, an I/O adapter218 for connecting peripheral devices such asdisk storage units220 to thebus212, auser interface adapter222 for connecting akeyboard224, amouse226, aspeaker228, amicrophone232, and/or other user interface devices such as a touch screen (not, shown) to thebus212,communication adapter234 for connecting the workstation to a communication network235 (e.g., a data processing network) and adisplay adapter236 for connecting thebus212 to adisplay device238.
The workstation may have resident thereon any desired operating system. It will be appreciated that an embodiment may also be implemented on platforms and operating systems other than those mentioned. One embodiment may be written using JAVA, C, and/or C++ language, or other programming languages, along, with an object oriented programming methodology. Object oriented programming (OOP) has become increasingly used to develop complex applications.
Of course, the various embodiments set forth herein may be implemented utilizing hardware, software, or any desired combination thereof. For that matter, any type of logic may be utilized which is capable of implementing the various functionality set forth herein.
FIG. 3 shows amethod300 for securing data on a server based on a heuristic analysis, in accordance with one embodiment. As an option, themethod300 may be carried out in the context of the architecture and environment ofFIGS. 1 and/or2. Of course, however, themethod300 may be carried out in any desired environment.
As shown inoperation302, information associated with attempts to access data on a server is recorded. In the context of the present description, the data may include any data capable of being stored on the server. For example, the data may include an electronic mail (email) message, an access control list (e.g. associated, with a database, computer program program, other data stored on the server, etc.), a file, a computer program, a database, etc.
Additionally, in one embodiment, the data may be particular to a user. For example, the data may be private with respect to the user (e.g. personal data, etc.), confidential with respect to the user, etc. To this end, the data may optionally only be accessible utilizing identification data (e.g. a unique identifier, etc.) associated with the user. As another option, the identification data (e.g. a user id file, etc.) may be created during registration of the user in connection with the server.
Just by way of example, the identification data may include an identification file unique to the user. Such identification file may include, in one embodiment, a private key, such that the private key may be associated with a public key for accessing the data particular to the user. In addition, the identification file may be stored on a client (e.g. personal computer, handheld device, any of the devices described above with respect toFIGS. 1 and/or2, etc.) utilized by the user, such that, in response to a request issued by the user utilizing the client to access the data, the client may be verified based on the identification file stored thereon.
Furthermore, the server on which the data is located may include any device capable of storing data. For example, the server may include any of the devices described above with respect toFIGS. 1 and/or2. In one embodiment, the server may include a particular type of server (e.g. application server, web server, database server, etc.) capable of providing a custom application platform at an enterprise level. Optionally, the server ma optionally provide email messaging functionality and/or any other desired applications for devices associated with an enterprise. Just by way of example, the server may be a IBM® Lotus® Domino® server, in one possible embodiment.
Still yet, the attempts to access the data on the server may include any requests made with respect to the data, which may, but do not necessarily result in actual access to the data. For example, the attempts to access the data may include requests to open, read, write, modify, etc. the data on the server. Optionally, the attempts to access the data may also include an attempt to log on to the server. In one embodiment, the attempts to access the data on the server may be issued remotely. For example, the attempts may be issued by a client to the server over a network (e.g. such as any of the networks described above with respect toFIG. 1).
Additionally, the attempts to access the data may be issued automatically. For example, the attempts may be issued by an application. As another option, the attempts to access the data may be issued manually. Such manual attempts may include, for example, user-initiated attempts.
Moreover, in one embodiment, the attempts to access the data may include an attempt to modify an access control list (ACL) initially. The ACL may include, for example, a list of permissions associated with content (e.g. files, email messages, computer programs, etc) located local and/or remote with respect to the server on which the data is stored. Such permissions may include user permissions, which indicate access rights to content based on particular users. As another option, the permissions may include application and/or device permissions, which may indicate access rights to content based on particular applications (e.g. computer programs, etc.) and/or devices (e.g. computers, etc.), respectively. Also modifying the ACL may optionally include modifying any of the permissions in the ACL.
In another embodiment, the attempts to access the data may include an attempt by a first user to access data at least previously inaccessible to such first user (e.g. due to the fact that it was particular to a second user, etc.). For example, identification data. previously utilized by the second user to access the data may be utilized by the first user to access the data. In this way, the first user may attempt to access data particular to the second user utilizing such identification data associated with the second user.
As another example, the identification data may have previously been stored on a second computer utilized by the second user to access the data, and may thus be subsequently stored on a first computer utilized by the first user to access the data. Accordingly, the attempts to access the data may include attempts to access data utilizing identification data that has changed locations.
In yet another embodiment, the attempts to access the data may include an attempt by a first user and an attempt by a second user to access the same data simultaneously. For example, the second user may attempt to access data during access of such data by the first user. Of course, it should be noted that such access attempts are only examples of various attempts to access the data that may be made, and that the attempts to access the data may be performed in any desired manner.
With reference still tooperation302 ofFIG. 3, the information associated with the attempts to access the data may include any information capable of describing, or being otherwise associated with such attempts. In one embodiment, the information may include a source of the attempts. For example, such source may identify a computer [e.g. by computer name, internet protocol (IP) address, etc.], a user, etc which initiated the attempts.
In another embodiment, the information may include a time associated with each of the attempts. In still yet another embodiment, the information may describe the type of attempts (e.g. open data read data, modify data etc.). Just by way of example, the information may describe an attempt to modify the data, in even still yet another embodiment, the information may indicate identification data utilized in attempting to access the data.
Also, the information may be recorded in any desired data structure capable of storing the same. For example, the information may be recorded in a log file. In one embodiment, the log file may be of any desired size. Optionally, a number of entries of information stored in the log file may be predetermined (e.g. user configured, etc.). In another embodiment, such data structure may be stored on the server on which the data attempted to be accessed is located. To this end, information associated with attempts to access data on a server is recorded.
As shown inoperation304, such information is heuristically analyzed. In the context of the present description, such analysis may include any heuristic analysis which utilizes recorded information associated with a plurality of attempts to access the data. Just by way of example, recorded information associated with a latest attempt to access the data may be analyzed with respect to recorded information associated with previous attempts to access the data. In this way, in some embodiments, characteristics, patterns, etc. may be identified from recorded information associated with a plurality of attempts to access the data, utilizing the heuristics analysis.
In one embodiment, the heuristic analysis may include determining whether the information is suspicious. For example, a determination that the information is suspicious may indicate that the attempts to access the data are suspicious. Moreover, determining that the information is suspicious may optionally indicate that the data attempted to be accessed (for which the information was recorded) is at least potentially associated with data leakage. Such data leakage may include any unwanted and/or unauthorized disclosure, sharing, discovery, etc. of the data.
For example, the characteristics, patterns, etc. identified from the information may indicate whether the information is suspicious. As an option, such characteristics, patterns, etc. may be compared with thresholds for determining whether the information is suspicious. Just by way of example, it may be determined that the information is suspicious if the information indicates that access to the data has been attempted a threshold number of times. Such threshold may include any predefined (e.g. user defined, automatically defined, etc.) threshold.
As an option, the information may be heuristically analyzed utilizing the server. For example, an application executing on the server may be utilized for heuristically analyzing the information. As another option, the information may be heuristically analyzed remotely from the server.
Still yet, the data is secured on the server based on the heuristic analysis, as shown inoperation306. In one embodiment, the data may be secured on the server if it is determined that the information is suspicious, based on the heuristics analysis. Thus, the data may be secured if at least potential data leakage is possible, based on the heuristic analysis.
Just by way of example, an ACL may be secured if a predetermined number of modifications to an ACL, or a specific portion thereof, have been made via the attempts to access such ACL. As another example, a database previously only accessed utilizing identification data stored on a first computer associated with a first user may be secured, if the database is subsequently accessed utilizing the same identification information which is stored on a second different computer associated with a second different user. In yet another example, data being accessed by a first user may be secured with respect to access by a second user during such access by the first user.
Additionally, in one embodiment, the data may be secured by preventing access to the data, such that access may be prevented for a predefined (e.g. user defined, etc.) time period, until an administrator enables access, etc. In another embodiment, the data may be secured by notifying an administrator or a user e.g. to which the data is particular), etc. Of course, however, the data may be secured in any desired manner.
More illustrative information will now be set forth regarding various optional architectures and features with which the foregoing technique may or may not be implemented, per the desires of the user. It should be strongly noted that the following information is set forth for illustrative purposes and should not be construed as limiting in any manner. Any of the following features may be optionally incorporated with or without the exclusion of other features described.
FIG. 4 shows amethod400 for taking action is response to a determination that information associated with an attempt to access data on a server is suspicious, in accordance with another embodiment. As an option, themethod400 may be carried out in the context of the architecture and environment ofFIGS. 1-3. Of course, however, themethod400 may be carried out in any desired environment. It should also be noted that the aforementioned definitions may apply during the present description.
As shown inoperation402, attempts to access data on a server are monitored. In one embodiment, such monitoring may be performed utilizing an application on the server. Of course, however, the monitoring may be performed remotely from the server, utilizing, for example, a computer or network device that intercepts attempts to access data directed from clients and/or other servers to the server on which the data is located.
In addition, it is determined whether an attempt to access the data on the server has been made. Notedecision404. In response to a determination that an access attempt has been made, information associated with the attempt is recorded, as shown inoperation406. Just by way of example, such information may include an identification of a source of the attempt, a time of the attempt, a description of the access type attempted, etc.
Optionally, the information may be recorded in a log file to which information associated with other attempts to access the data has been recorded. In this way, the log file may include information associated with a plurality of attempts to access the data. Also, the log file may include information associated with attempts to access other data on the server.
As another option, the log file may be configured (e.g. user-configured, etc.). For example, the information that is recorded in the log file may be selected based on the configuration. To this end, only desired information associated with the attempt to access the data may be recorded.
Table 1 illustrates one example of a log file in which information associated with attempts to access data on a server may be recorded. It should be noted that such log file is set forth for exemplary purposes only, and thus should not be construed as limiting in any manner.
TABLE 1
DATASOU RCETIMEDESCRIPTION
ACL_02Computer_0102:45:00Attempt to Add
permission for
User_01 to access
File_05
User 5 mailComputer_0502:40:00Simultaneous
Databasesession opened from
Computer_04
ACL_02Computer_0102:39:00Add permission for
User_01 to access
File_04
File_01Computer_0302:37:00Read File_01
ACL_02Computer_0202:34:00Delete permission
for User_02 to
access File_01
As shown in Table 1, each entry in the log file may indicate the particular data attempted to be accessed, in addition, with respect to each entry, an identifier of a computer that initiated the attempt may be recorded, along with a time of the attempt. The description of each log file entry may indicate the type of access attempted, as also shown. While not shown, it should be noted that a flag, or any other desired indicator, may be associated with each entry in the log file for indicating whether access to the data associated with the attempt was prevented, allowed, successful, etc., and optionally any actions taken in response thereto (e.g. notifications, etc.).
Furthermore, as shown inoperation408, the information associated with the attempt to access the data is heuristically analyzed. For example, the heuristic analysis may include an analysis of the information with respect to any other information in the log file associated with another (e.g. previous) attempt to access the data. In this way, characteristics, patterns, etc. associated with attempts to access the data may be identified utilizing the heuristic analysis.
Additionally, it is determined whether the information is suspicious, based on the heuristic analysis. Notedecision410. Such determination may be made based on predefined thresholds compared to results of the heuristic, analysis, just by way of example. Still yet, a determination that the information is suspicious may indicate that the attempt to access the data is suspicious, that the data is at least potentially being subjected to data leakage, etc.
If it is determined that the information is not suspicious, further attempts to access data on the server are monitored (operation402). Of course, however, attempts to access data on the server, as inoperation402, may be continuously monitored. In this way, attempts to access data on the server may be monitored during a heuristic analysis of any identified attempts.
If however, it is determined that the information is suspicious, action is taken, as shown inoperation412. As an option, the action taken may be based on the type of access attempted. For example, if the access includes reading the data or opening the data, the action may include communicating a notification e.g. alert, etc.) to an administrator, user, etc. In another example, if the access includes modifying the data, transmitting the data, deleting the data, etc., the action may include preventing the access or the attempted use/manipulation of the data.
As another option, the action taken may be based on the data attempted to be accessed. In this way, particular types of data may each be associated with different actions e.g. based on user definitions, etc.). For example, if the access is associated with an ACL, the action may include preventing the access. As another example, if the access is associated with an email message, the action may include communicating a notification.
As yet another option, the action taken may be based on the characteristics, patterns, etc. identified by the heuristic analysis, in one embodiment, if the heuristic analysis determines that a predetermined number of modifications have been attempted to modify an ACL (e.g. within a predefined time period, etc.), the action may include preventing an access to the ACL. In another embodiment, if the heuristic analysis determines that identification data utilized in the attempt to access the data has previously been utilized by a different user, the action may include communicating a notification to the different user, an administrator, etc.
Of course, it should be noted that the action taken may be selected in any desired manner. Further, the action may include any desired action capable of being taken in response to a determination that the information is suspicious. To this end, data leakage may be prevented by taking action when information associated with an attempt to access the data is determined to be suspicious.
in one exemplary embodiment, an attempt to modify an ACL is identified. The modification may include changing permissions designated by the ACL, for example. In response to identification of the attempt, information associated with such attempt is recorded. As an option, the information may include a source (e.g. computer, user, etc.) that initiated the attempt.
The recorded information is further heuristically analyzed. For example, the recorded information may be analyzed in view of other recorded information associated with other attempts to modify the ACL. Accordingly, a pattern of attempts to modify the ACL (e.g. by a particular computer, within a predetermined time period, etc.) may be identified. In response to an indication that the information is suspicious (based on the heuristic analysis), an action may be taken to prevent the attempted modification to the ACL. In this way, in response to a determination that information associated with an attempt to modify an ACL is suspicious, such access may be prevented.
In another exemplary embodiment, an attempt to log on to a server utilizing identification data is identified. In response, information associated with the attempt is recorded. Such information may identify a source of the attempt, the identification data, etc.
Further, the information is heuristically analyzed. Such heuristic analysis may include identifying previously recorded information associated with the identification data. In addition, the heuristic analysis may include determining whether the identification data was associated with different sources, based on the identification of the previously recorded information. For example, information indicating that different sources utilized the identification data may signify that the information associated with the attempt to log on to the server is suspicious. Optionally, such signification may be based on whether the identification data was used intermittently between a pair of, or more, different sources.
In this way, the heuristic analysis may be utilized for identifying at least potential data leakage by way of possible unauthorized use of identification data. In response to such situation, use of the identification data may be prevented (e.g. for all sources, for sources that do not include a source to which the identification data is registered, etc.). As other option, in response to the identification of potential data leakage, a notification may be communicated to a user, computer, etc. registered to the identification data.
In yet another exemplary embodiment, an attempt to access data on a server identification data is identified. In response, information associated with the attempt is recorded. For example, such information may include a source of the attempt, the identification data utilized, etc. Thus, the information may indicate a location of the identification data, based on the identified source.
Similar to the other example of use, the recorded information is also heuristically analyzed. Such heuristic analysis may include determining previously stored information associated with the identification data. In this way, any other sources that utilized the identification data to access data on the server previous to the identified attempt may be identified. Additionally, the heuristic analysis may include determining whether any of such sources are different than the source associated with the identified attempt.
Identification of any differences may optionally indicate that the information is suspicious. For example, differences in sources utilizing the same identification data may indicate unauthorized use of the identification data by sources (e.g. via theft of such identification data etc.) for illegitimately accessing data such as potentially confidential data, associated therewith. Of course, this may not be deemed unauthorized use all of the time, as some users access the data from two or more different locations. Accordingly, the attempt to access the data may be prevented for avoiding potential leakage of the data. To this end, in situations where identification data, such as an identification file uniquely registered to a user, is compromised, access to data utilizing the identification data may be prevented.
In still yet another exemplary embodiment, an attempt to access data is identified. In response, information associated with the attempt is recorded. In the context of the present exemplary embodiment, such information may include a source of the attempt.
Moreover, the stored information is heuristically analyzed. Such heuristic analysis may include determining whether any previously recorded information is associated with an access attempt with respect to the data. Optionally, only information recorded within a predetermined amount of time previous to the identified attempt may be identified. As another option, only information which indicates that the data is still being accessed based on a previous attempt may be identified.
In this way, it may be determined whether the data associated with the access attempt is currently being accessed by another source. In response to such a scenario, the identified attempt to access the data may be prevented. In this way, access to the same data by different sources simultaneously may be prevented. As another option, access to such data may be allowed simultaneously, but notifications may be communicated to such sources.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (21)

1. A method, comprising:
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled;
heuristically analyzing the information associated with the attempts in order to identify a pattern associated with data leakage; and
securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server.
19. A computer program product embodied on a non-transitory computer readable medium for:
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled;
heuristically analyzing the information associated with the attempts in order to identify a pattern associated with data leakage; and
securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server.
20. A system, comprising:
a processor, wherein the system is configured for:
recording information associated with attempts to access data on a server,
heuristically analyze the information associated with the attempts in order to identify a pattern associated with data leakage;
securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server.
US11/762,5452007-06-132007-06-13System, method, and computer program product for securing data on a server based on a heuristic analysisExpired - Fee RelatedUS8281405B1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US11/762,545US8281405B1 (en)2007-06-132007-06-13System, method, and computer program product for securing data on a server based on a heuristic analysis
US13/631,843US8776252B2 (en)2007-06-132012-09-28System, method, and computer program product for securing data on a server based on a heuristic analysis

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/762,545US8281405B1 (en)2007-06-132007-06-13System, method, and computer program product for securing data on a server based on a heuristic analysis

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US13/631,843ContinuationUS8776252B2 (en)2007-06-132012-09-28System, method, and computer program product for securing data on a server based on a heuristic analysis

Publications (1)

Publication NumberPublication Date
US8281405B1true US8281405B1 (en)2012-10-02

Family

ID=46924915

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/762,545Expired - Fee RelatedUS8281405B1 (en)2007-06-132007-06-13System, method, and computer program product for securing data on a server based on a heuristic analysis
US13/631,843ActiveUS8776252B2 (en)2007-06-132012-09-28System, method, and computer program product for securing data on a server based on a heuristic analysis

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US13/631,843ActiveUS8776252B2 (en)2007-06-132012-09-28System, method, and computer program product for securing data on a server based on a heuristic analysis

Country Status (1)

CountryLink
US (2)US8281405B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8776252B2 (en)2007-06-132014-07-08Mcafee, Inc.System, method, and computer program product for securing data on a server based on a heuristic analysis
US20150235049A1 (en)*2014-02-202015-08-20International Business Machines CorporationMaintaining Data Privacy in a Shared Data Storage System
US9674202B1 (en)*2015-12-292017-06-06Imperva, Inc.Techniques for preventing large-scale data breaches utilizing differentiated protection layers
US9674201B1 (en)2015-12-292017-06-06Imperva, Inc.Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
US11240258B2 (en)*2015-11-192022-02-01Alibaba Group Holding LimitedMethod and apparatus for identifying network attacks

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA2869448A1 (en)*2013-11-042015-05-04The L.D. Kichler Co.Low voltage lighting power supply systems and methods

Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5845067A (en)1996-09-091998-12-01Porter; Jack EdwardMethod and apparatus for document management utilizing a messaging system
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20040008846A1 (en)*2002-07-102004-01-15Alexander MedvinskyMethod of preventing unauthorized distribution and use of electronic keys using a key seed
US20050246778A1 (en)*2004-04-232005-11-03Viacheslav UsovTransparent encryption and access control for mass-storage devices
US20060179040A1 (en)*2005-02-082006-08-10International Business Machines CorporationData leak protection system, method and apparatus
US20060225134A1 (en)*2005-03-312006-10-05Conti Gregory RMethod and system for detection and neutralization of buffer overflow attacks
US20070006322A1 (en)*2005-07-012007-01-04Privamed, Inc.Method and system for providing a secure multi-user portable database
US20070011303A1 (en)2005-07-112007-01-11Fujitsu LimitedMethod and apparatus for tracing data in audit trail, and computer product
US20070061786A1 (en)*2004-05-042007-03-15Ling ZhouMethods and apparatus for modifying process control data
US7206964B2 (en)2002-08-302007-04-17Availigent, Inc.Consistent asynchronous checkpointing of multithreaded application programs based on semi-active or passive replication
US20070094725A1 (en)*2005-10-212007-04-26Borders Kevin RMethod, system and computer program product for detecting security threats in a computer network
US20070150955A1 (en)*2005-12-272007-06-28Nec CorporationEvent detection system, management terminal and program, and event detection method
US20070250920A1 (en)*2006-04-242007-10-25Jeffrey Dean LindsaySecurity Systems for Protecting an Asset
US20080082538A1 (en)*2006-09-282008-04-03Microsoft CorporationAccess management in an off-premise environment
US7603718B2 (en)*2005-03-312009-10-13Microsoft CorporationSystems and methods for protecting personally identifiable information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6073142A (en)1997-06-232000-06-06Park City GroupAutomated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments
US5987610A (en)1998-02-121999-11-16Ameritech CorporationComputer virus screening methods and systems
US6460050B1 (en)1999-12-222002-10-01Mark Raymond PaceDistributed content identification system
US6901519B1 (en)2000-06-222005-05-31Infobahn, Inc.E-mail virus protection system and method
US8281405B1 (en)2007-06-132012-10-02Mcafee, Inc.System, method, and computer program product for securing data on a server based on a heuristic analysis

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5845067A (en)1996-09-091998-12-01Porter; Jack EdwardMethod and apparatus for document management utilizing a messaging system
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20040008846A1 (en)*2002-07-102004-01-15Alexander MedvinskyMethod of preventing unauthorized distribution and use of electronic keys using a key seed
US7206964B2 (en)2002-08-302007-04-17Availigent, Inc.Consistent asynchronous checkpointing of multithreaded application programs based on semi-active or passive replication
US20050246778A1 (en)*2004-04-232005-11-03Viacheslav UsovTransparent encryption and access control for mass-storage devices
US20070061786A1 (en)*2004-05-042007-03-15Ling ZhouMethods and apparatus for modifying process control data
US20060179040A1 (en)*2005-02-082006-08-10International Business Machines CorporationData leak protection system, method and apparatus
US20060225134A1 (en)*2005-03-312006-10-05Conti Gregory RMethod and system for detection and neutralization of buffer overflow attacks
US7603718B2 (en)*2005-03-312009-10-13Microsoft CorporationSystems and methods for protecting personally identifiable information
US20070006322A1 (en)*2005-07-012007-01-04Privamed, Inc.Method and system for providing a secure multi-user portable database
US20070011303A1 (en)2005-07-112007-01-11Fujitsu LimitedMethod and apparatus for tracing data in audit trail, and computer product
US20070094725A1 (en)*2005-10-212007-04-26Borders Kevin RMethod, system and computer program product for detecting security threats in a computer network
US20070150955A1 (en)*2005-12-272007-06-28Nec CorporationEvent detection system, management terminal and program, and event detection method
US20070250920A1 (en)*2006-04-242007-10-25Jeffrey Dean LindsaySecurity Systems for Protecting an Asset
US20080082538A1 (en)*2006-09-282008-04-03Microsoft CorporationAccess management in an off-premise environment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8776252B2 (en)2007-06-132014-07-08Mcafee, Inc.System, method, and computer program product for securing data on a server based on a heuristic analysis
US20150235049A1 (en)*2014-02-202015-08-20International Business Machines CorporationMaintaining Data Privacy in a Shared Data Storage System
US11240258B2 (en)*2015-11-192022-02-01Alibaba Group Holding LimitedMethod and apparatus for identifying network attacks
US9674202B1 (en)*2015-12-292017-06-06Imperva, Inc.Techniques for preventing large-scale data breaches utilizing differentiated protection layers
US9674201B1 (en)2015-12-292017-06-06Imperva, Inc.Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets
US10382400B2 (en)2015-12-292019-08-13Imperva, Inc.Techniques for preventing large-scale data breaches utilizing differentiated protection layers
US10404712B2 (en)2015-12-292019-09-03Imperva, Inc.Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets

Also Published As

Publication numberPublication date
US8776252B2 (en)2014-07-08
US20130024943A1 (en)2013-01-24

Similar Documents

PublicationPublication DateTitle
US11741222B2 (en)Sandbox environment for document preview and analysis
US11645404B2 (en)System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US7890627B1 (en)Hierarchical statistical model of internet reputation
US9386032B2 (en)Method and system for detecting restricted content associated with retrieved content
US9838349B2 (en)Zone classification of electronic mail messages
US9516062B2 (en)System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8286255B2 (en)Computer file control through file tagging
US8479267B2 (en)System and method for identifying unauthorized endpoints
US8266687B2 (en)Discovery of the use of anonymizing proxies by analysis of HTTP cookies
US10834115B2 (en)Methods and systems for providing security for page framing
US8499152B1 (en)Data positioning and alerting system
US8776252B2 (en)System, method, and computer program product for securing data on a server based on a heuristic analysis
US8950005B1 (en)Method and system for protecting content of sensitive web applications
US20100251369A1 (en)Method and system for preventing data leakage from a computer facilty
US11297024B1 (en)Chat-based systems and methods for data loss prevention
US10540637B2 (en)Intelligent, context-based delivery of sensitive email content to mobile devices
US9432357B2 (en)Computer network security management system and method
US20130247208A1 (en)System, method, and computer program product for preventing data leakage utilizing a map of data
US12074911B1 (en)Systems and methods for network security
US20250148074A1 (en)Multistage Quarantine of Emails
US20250240258A1 (en)Configuring a Monitor Mode for Suspicious Content in Emails
Anwar et al.Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs
US12381838B2 (en)Stateful email detection using schemaless data fragments
US20250071124A1 (en)Systems and methods for processing electronic communications
US20250310288A1 (en)Determining Events that Prevent Processing of Email Messages

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MCAFEE, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GADDALA, SATISH KUMAR;REEL/FRAME:019431/0717

Effective date:20070612

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918

Effective date:20161220

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786

Effective date:20170929

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676

Effective date:20170929

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

ASAssignment

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593

Effective date:20170929

Owner name:JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047

Effective date:20170929

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001

Effective date:20201026

ASAssignment

Owner name:MCAFEE, LLC, CALIFORNIA

Free format text:RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213

Effective date:20220301

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335

Effective date:20220301

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307

Effective date:20220301

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20241002


[8]ページ先頭

©2009-2025 Movatter.jp